Found: 162
Select item for more details and to access through your institution.
Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing.
- Published in:
- Computer Systems Science & Engineering, 2022, v. 43, n. 3, p. 967, doi. 10.32604/csse.2022.024854
- By:
- Publication type:
- Article
TURNING ID INSIDE OUT.
- Published in:
- Government Technology, 2019, v. 32, n. 2, p. 26
- By:
- Publication type:
- Article
IDENTITY & ACCESS MANAGEMENT TODAY.
- Published in:
- Government Technology, 2019, v. 32, n. 2, p. 14
- By:
- Publication type:
- Article
STATES OF IDENTITY.
- Published in:
- Government Technology, 2019, v. 32, n. 2, p. 20
- By:
- Publication type:
- Article
A model of digital identity for better information security in e-learning systems.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 3, p. 3325, doi. 10.1007/s11227-021-03981-4
- By:
- Publication type:
- Article
SELF SOVEREIGN IDENTITY BASED MUTUAL GUARDIANSHIP.
- Published in:
- Journal of Modern Technology & Engineering, 2020, v. 5, n. 3, p. 189
- By:
- Publication type:
- Article
Health-ID: A Blockchain-Based Decentralized Identity Management for Remote Healthcare.
- Published in:
- Healthcare (2227-9032), 2021, v. 9, n. 6, p. 712, doi. 10.3390/healthcare9060712
- By:
- Publication type:
- Article
Evolving cybersecurity landscape – Comparing the regulatory approaches in the EU, in China and in Singapore — An analysis of legislative approaches to key issues in tackling a global phenomenon.
- Published in:
- Computer Law Review International, 2022, v. 23, n. 6, p. 165, doi. 10.9785/cri-2022-230602
- By:
- Publication type:
- Article
A User Identity Management System for Cybercrime Control.
- Published in:
- Nigerian Journal of Technology, 2021, v. 40, n. 1, p. 129, doi. 10.4314/njt.v40i1.17
- By:
- Publication type:
- Article
A ROBUST NATIONAL CENTRALIZED DATABASE SYSTEM FOR IDENTITY MANAGEMENT AND SECURITY CONTROL IN NIGERIA.
- Published in:
- Annals. Computer Science Series, 2019, v. 17, n. 2, p. 261
- By:
- Publication type:
- Article
Blockchain-Enabled Communication Framework for Secure and Trustworthy Internet of Vehicles.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 12, p. 9399, doi. 10.3390/su15129399
- By:
- Publication type:
- Article
Does Identification Influence Continuous E-Commerce Consumption? The Mediating Role of Intrinsic Motivations.
- Published in:
- Sustainability (2071-1050), 2019, v. 11, n. 7, p. 1944, doi. 10.3390/su11071944
- By:
- Publication type:
- Article
FEDERATED IDENTITY MANAGEMENT AND THE NSTIC: CO-MANAGING INFORMATION PRIVACY.
- Published in:
- 2014
- By:
- Publication type:
- Essay
Converged social media: Identity management and engagement on Facebook Mobile and blogs.
- Published in:
- Australasian Journal of Educational Technology, 2013, v. 29, n. 3, p. 315, doi. 10.14742/ajet.117
- By:
- Publication type:
- Article
Health (Trans)gressions: Identity and Stigma Management in Trans* Healthcare Support Seeking.
- Published in:
- Women & Language, 2016, v. 39, n. 1, p. 49
- By:
- Publication type:
- Article
VIRGINIA ID PLATFORM.
- Published in:
- Government Technology, 2014, v. 27, n. 2, p. 12
- By:
- Publication type:
- Article
A Hybrid Scheme for an Interoperable Identity Federation System Based on Attribute Aggregation Method.
- Published in:
- Computers (2073-431X), 2019, v. 8, n. 3, p. 51, doi. 10.3390/computers8030051
- By:
- Publication type:
- Article
MANAGEMENTUL ACCESULUI ŞI AL IDENTITĂŢILOR ÎN INFRASTRUCTURILE IoT.
- Published in:
- Infosfera: Journal of Security Studies & Defense Intelligence, 2023, v. 15, n. 3, p. 62
- By:
- Publication type:
- Article
TINKLINĖS PROGRAMINĖS ĮRANGOS AUTENTIFIKAVIMO UNIFIKACIJOS TYRIMAS.
- Published in:
- Professional Studies: Theory & Practice / Profesines Studijos: Teorija ir Praktika, 2013, n. 12, p. 167
- By:
- Publication type:
- Article
Preserving Identity Leakage, Data Integrity and Data Privacy Using Blockchain in Education System.
- Published in:
- International Journal of Information Security Science, 2022, v. 11, n. 1, p. 1
- By:
- Publication type:
- Article
ON THE DIFFERENTIAL USES OF THE STRATEGIES OF BOOSTING AND BLASTING FOLLOWING ONE'S TEAM VICTORY: THE MEDIATING ROLE OF POSITIVE MOOD.
- Published in:
- Journal of Contemporary Athletics, 2017, v. 11, n. 4, p. 229
- By:
- Publication type:
- Article
Editorial.
- Published in:
- Journal of Information System Security, 2013, v. 9, n. 1, p. 1
- Publication type:
- Article
The Identity Crisis Security, Privacy and Usability Issues in Identity Management.
- Published in:
- Journal of Information System Security, 2013, v. 9, n. 1, p. 23
- By:
- Publication type:
- Article
PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud.
- Published in:
- KSII Transactions on Internet & Information Systems, 2014, v. 8, n. 1, p. 282, doi. 10.3837/tiis.2014.01.017
- By:
- Publication type:
- Article
Adaptive identity and access management-contextual data based policies.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0043-2
- By:
- Publication type:
- Article
A Quantum Identity Authentication Protocol Based on Optical Transmission & Face Recognition.
- Published in:
- International Journal of Online Engineering, 2018, v. 14, n. 4, p. 58, doi. 10.3991/ijoe.v14i04.8374
- By:
- Publication type:
- Article
DIdM-EIoTD: Distributed Identity Management for Edge Internet of Things (IoT) Devices.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 8, p. 4046, doi. 10.3390/s23084046
- By:
- Publication type:
- Article
Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 4, p. 2106, doi. 10.3390/s23042106
- By:
- Publication type:
- Article
Cybersecurity Risk Management Framework for Blockchain Identity Management Systems in Health IoT.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 1, p. 218, doi. 10.3390/s23010218
- By:
- Publication type:
- Article
Health-zkIDM: A Healthcare Identity System Based on Fabric Blockchain and Zero-Knowledge Proof.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 20, p. N.PAG, doi. 10.3390/s22207716
- By:
- Publication type:
- Article
Self-Sovereignty Identity Management Model for Smart Healthcare System.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 13, p. 4714, doi. 10.3390/s22134714
- By:
- Publication type:
- Article
Reinforced Palmprint Reconstruction Attacks in Biometric Systems.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 2, p. 591, doi. 10.3390/s22020591
- By:
- Publication type:
- Article
Evaluating the Performance of Speaker Recognition Solutions in E-Commerce Applications.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 18, p. 6231, doi. 10.3390/s21186231
- By:
- Publication type:
- Article
Distributed Ledger Technology for eHealth Identity Privacy: State of The Art and Future Perspective.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 2, p. 1, doi. 10.3390/s20020483
- By:
- Publication type:
- Article
Towards an Information Strategy for Combating Identity Fraud in the Public Domain: Cases from Healthcare and Criminal Justice.
- Published in:
- Electronic Journal of e-Government, 2011, v. 9, n. 2, p. 214
- By:
- Publication type:
- Article
"He Lied to the People, Saying 'I Am Nebuchadnezzar'": Issues in Authority Control for Rebels, Usurpers, Eccentric Nobility, and Dissenting Royalty.
- Published in:
- Library Resources & Technical Services, 2022, v. 66, n. 2, p. 94, doi. 10.5860/lrts.66n2.94
- By:
- Publication type:
- Article
Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems.
- Published in:
- Mobile Information Systems, 2021, p. 1, doi. 10.1155/2021/2807395
- By:
- Publication type:
- Article
Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems.
- Published in:
- Mobile Information Systems, 2021, p. 1, doi. 10.1155/2021/2807395
- By:
- Publication type:
- Article
Hide and Seek: Costly Consumer Privacy in a Market with Repeat Purchases.
- Published in:
- Marketing Science, 2012, v. 31, n. 2, p. 277, doi. 10.1287/mksc.1110.0691
- By:
- Publication type:
- Article
A Secure Client Aware Certification for Mobile Cloud Offloading Decision.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2017, v. 10, n. 2, p. 106, doi. 10.22266/ijies2016.0430.12
- By:
- Publication type:
- Article
A Bibliometric Study of Scientific Production on Self-Sovereign Identity.
- Published in:
- Ingeniería (0121-750X), 2023, v. 28, p. 1, doi. 10.14483/23448393.19656
- By:
- Publication type:
- Article
ANALYSIS OF DISRUPTIVE SIM TECHNOLOGIES USING BUSINESS ECOSYSTEM CONCEPT.
- Published in:
- Advances in Business-Related Scientific Research Journal, 2016, v. 7, n. 1, p. 93
- By:
- Publication type:
- Article
DNS-IdM: A Blockchain Identity Management System to Secure Personal Data Sharing in a Network.
- Published in:
- Applied Sciences (2076-3417), 2019, v. 9, n. 15, p. 2953, doi. 10.3390/app9152953
- By:
- Publication type:
- Article
ENHANCED ANALYSIS OF BLOCKCHAIN BASED FINANCIAL INSTITUTIONS.
- Published in:
- ICTACT Journal on Communication Technology, 2023, v. 14, n. 1, p. 2861, doi. 10.21917/ijct.2023.0425
- By:
- Publication type:
- Article
USING KERBEROS PROTOCOL FOR SINGLE SIGN-ON IN IDENTITY MANAGEMENT SYSTEMS.
- Published in:
- Journal of Information Technology & Applications, 2013, v. 3, n. 1, p. 27, doi. 10.7251/JIT1301027M
- By:
- Publication type:
- Article
SCATTERED IDENTITIES- A GOVERNANCE NIGHTMARE!
- Published in:
- GSTF Journal on Computing, 2011, v. 1, n. 2, p. 211, doi. 10.5176/2010-2283_1.2.62
- By:
- Publication type:
- Article
Organizational Policy Communication Research: Challenges, Discoveries, and Future Directions.
- Published in:
- Communication Reports, 2015, v. 28, n. 1, p. 48, doi. 10.1080/08934215.2013.865063
- By:
- Publication type:
- Article
Retracted: Digital Identity Verification and Management System of Blockchain-Based Verifiable Certificate with the Privacy Protection of Identity and Behavior.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Towards an Improved Taxonomy of Attacks Related to Digital Identities and Identity Management Systems.
- Published in:
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/5573310
- By:
- Publication type:
- Article
Digital Identity Verification and Management System of Blockchain-Based Verifiable Certificate with the Privacy Protection of Identity and Behavior.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/6800938
- By:
- Publication type:
- Article